Cybersecurity Blog
Cisa Warned 1,750 Organizations of Ransomware Vulnerabilities Last Year. Only Half Took Action.
The Cybersecurity and Infrastructure Security Agency sent out alerts to critical infrastructure sectors, with only 852 ...
Microsoft, Google Widen Passkey Support for Its Users
Passkeys are gaining widespread adoption as an alternative to traditional passwords for digital authentication. Major ...
European Raids Shut Down Call Centers Used to ‘Shock and Cheat’ Victims
The criminal network was responsible for defrauding thousands of victims through fake police calls, investment fraud, or ...
Russia-Linked APT28 and Crooks are Still Using the Moobot Botnet
Trend Micro researchers revealed that the botnet, primarily operating through compromised Ubiquiti EdgeRouters, is used ...
New ‘Cuckoo’ Persistent macOS Spyware Targeting Intel and Arm Macs
Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that’s designed ...
Crypto Recovery Scams – And How They Add Insult to Injury
Crypto recovery scams involve fraudsters who offer to help victims recover stolen cryptocurrency in exchange for an ...
Microsoft Outlook Flaw Exploited by Russia’s APT28 to Hack Czech, German Entities
Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by ...
Ukraine Records Increase in Financially Motivated Attacks by Russian Hackers
These hackers are employing sophisticated phishing techniques to distribute malicious software and target financial ...